Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Advanced search
My bookmarks
0
Journal of hardware and systems security (source)
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TTÜ subject term
TTÜ department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TTÜ subject term
TTÜ department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TTÜ subject term
TTÜ department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TTÜ subject term
TTÜ department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TTÜ subject term
TTÜ department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
Add criteria
Simple search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publication
..
year
year of publication
Loading..
author
Loading..
TTÜ department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
2
Look more..
(2/130)
Export
export all inquiry results
(2)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article
Chip-to-Chip authentication method based on SRAM PUF and public key cryptography
Karageorgos, Ioannis
;
Isgenc, Mehmet Meric
;
Pagliarini, Samuel Nascimento
;
Pileggi, Larry
Journal of hardware and systems security
2019
/
p. 382–396 : ill
https://doi.org/10.1007/s41635-019-00080-y
journal article
2
journal article
A versatile and flexible multiplier generator for Large integer polynomials
Imran, Malik
;
Abideen, Zain Ul
;
Pagliarini, Samuel Nascimento
Journal of hardware and systems security
2023
/
p. 55–71
https://doi.org/10.1007/s41635-023-00134-2
journal article
Seotud publikatsioonid
1
Hardware realization of lattice-based post-quantum cryptography = Võrel põhinev post-kvant-krüptograafia riistvaraline realisatsioon
Number of records 2, displaying
1 - 2
keyword
128
1.
hardware security
2.
hardware security primitive
3.
communicating hardware/software systems
4.
communicating software/hardware systems
5.
software/hardware systems
6.
security systems for military objects
7.
computer hardware
8.
crypto-hardware
9.
Embedded hardware
10.
hardware
11.
hardware accelerator
12.
hardware close programming
13.
hardware customization
14.
hardware design
15.
hardware for the IoT
16.
hardware implementation
17.
hardware in the loop
18.
hardware Obfuscation
19.
hardware problems
20.
hardware rejuvenation
21.
Hardware Trojan
22.
hardware trojan horse
23.
Hardware Trojan Horses
24.
hardware trojans
25.
Hardware Verification
26.
hardware/software co-design
27.
hardware-in-the loop simulation
28.
hardware-in-the-loop
29.
Hardware-in-the-Loop simulation
30.
integer-only hardware
31.
open hardware
32.
open source hardware
33.
opensource hardware
34.
open-source hardware
35.
power-hardware-in-the-loop
36.
reconfigurable hardware
37.
software/hardware partitioning
38.
special-purpose hardware
39.
trustworthy hardware
40.
EU-LISA (European Agency for the Operational Management of large-scale IT Systems in the Area of Freedom, Security and Justice)
41.
ad-hoc sensor networks security
42.
Automatic Security Verification
43.
Blockchain security
44.
cache security
45.
communication system security
46.
comprehensive system of economic security
47.
computer security
48.
cooperative security dilemma
49.
cyber security
50.
cyber security education
51.
cyber security exercises
52.
cyber security strategies
53.
cyber-security
54.
data security
55.
development of security cameras
56.
drinking water security
57.
economic security
58.
economic security of enterprise
59.
emotional security
60.
energy security
61.
energy security indicator
62.
graded security
63.
human security
64.
information security
65.
internal security
66.
international security
67.
investment and innovation security
68.
IPv6 security
69.
IT security
70.
IT security management
71.
job security
72.
long-term security
73.
metadata model for security measures
74.
Middle Eastern security
75.
Mobile security
76.
national cyber security strategy
77.
national security
78.
NATO. Science for Peace and Security Program
79.
network security
80.
network security monitoring
81.
OSCE (Organization for Security and Co-operation in Europe)
82.
passenger’s security
83.
policy-based routing security
84.
political and security cultures
85.
post-quantum security
86.
power system security
87.
quantitative security
88.
regional security
89.
RISC-V Security Verification
90.
security
91.
security and justice (AFSJ)
92.
security and privacy
93.
security and privacy in smart grids
94.
Security Assertion Mining
95.
security closure
96.
Security Coverage
97.
security dataset
98.
security dilemma
99.
Security evaluation
100.
security log analysis
101.
security management
102.
security model
103.
security monitoring
104.
security notion
105.
security objectives
106.
security of data
107.
security of supply
108.
security operation center
109.
security patterns
110.
security policy
111.
security problem definition
112.
security proof
113.
security protocols
114.
security requirements
115.
security requirements engineering
116.
security risk assessment
117.
security risk management
118.
security strategies
119.
security testing
120.
security training
121.
security verification
122.
social security planning
123.
societal security
124.
system of economic security
125.
system security
126.
terrorism security
127.
transmission System Security
128.
voting privacy and security
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
vaste
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TTÜ department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TTÜ department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT